Received: by 2002:a5d:9c59:0:0:0:0:0 with SMTP id 25csp2158749iof; Tue, 7 Jun 2022 21:42:51 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxsJRve89QvqRUTDdEPt6y5zjYgHHZdQ06j1sxQolsqIgRPY2P7pePteoy5geW9t6E7Taze X-Received: by 2002:a17:902:f64c:b0:156:4349:7e9b with SMTP id m12-20020a170902f64c00b0015643497e9bmr32836962plg.139.1654663371197; Tue, 07 Jun 2022 21:42:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1654663371; cv=none; d=google.com; s=arc-20160816; b=jvRkyjLI1aREWRewgX2IjCHZ8WycCK/mWPB9PZ5pEbFtgNOXpof+rHPhk+lPjY6OJL tmhFNMtgbZYhcAErXWdKzfXJKN+sKUQmgu47PLvSdzDNiiRngadwppJtA60wPrxUCLL3 DPyyw2COPO1UxOPbE081jI9ZSyZIJgbNvb8PJAc6Mo49C483YWyCG8RmceNSbMYsdtYK xRcmcHnNfT5/VK173/VQBxYAnd2wrD+vSbqH9fD7H9NCv8MF9bLPn1CQahb51BtoWIU5 7PhHCxwFjrvgLz4HoKc3KYJ0IS4LpvnIS3+jEuMNHeqo6zD4/GSPSjhrkr6A/TE4bSn9 2yBQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=XJlL6LbQ6yFe3ubpRdunBZ4XHnSSOkBWukelQhLFYPQ=; b=nkO9e+7Z25Ir365XIvF1olTYL4ZhQ5BmwWhOs1U+r95zyDnnSw2jcdFdvgGOlLJUnq NATRem6eK0aY7fqHWmebdav/YFkX54lXAxQeuOz+FTUjiMuFZBQLN9hso+7CFphh7iNO 93AoXSnjSAmXxxTC3yD+TJZuam/kZslgmuQ+ryj/lg8H9JpK95PvDdDq6NO6VChm7P5f ZMpnYrcvgnVoL6jHtGVRIPxSZKXELrpKsjHXc5P5jHCosabNlS1u/rHWw1ltzFrNNqh3 S6U8vvY9hWmJggiujte4krm2mlJTCoIbIe1JyOlBW2CGpR0Vhzpt6+gC4mFU4ZpgEfNR 8kvQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=wV2Nhrgu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id jc2-20020a17090325c200b001640d431a26si10135909plb.112.2022.06.07.21.42.50 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 07 Jun 2022 21:42:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=wV2Nhrgu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 5C08B29DC02; Tue, 7 Jun 2022 21:12:56 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1351094AbiFGSBn (ORCPT + 99 others); Tue, 7 Jun 2022 14:01:43 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40454 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1347692AbiFGRl5 (ORCPT ); Tue, 7 Jun 2022 13:41:57 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 688A5127183; Tue, 7 Jun 2022 10:34:39 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 1788F60DB5; Tue, 7 Jun 2022 17:34:10 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 2D498C36B01; Tue, 7 Jun 2022 17:34:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1654623249; bh=iAhzv6COI/nHTO6HlQRmz2H0BLgcxPcMNLfg+h3M7+s=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=wV2Nhrgu4jCI+97HaYdu3vkIgGSNDPn/7VUerFx9Jjs624hD1puUi6E2QWMD3B838 TRwUFR4jr77LscvD9kHKKrx9Mm141W6NL83JHcNkS2sKvqNmTrQC1T5pgSepk9UIuI wfVA3v7kctbtTmgL3vXVecM4xTb4OG74gFbAj3AE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, stable@kernel.org, Chao Yu , Jaegeuk Kim Subject: [PATCH 5.10 350/452] f2fs: fix fallocate to use file_modified to update permissions consistently Date: Tue, 7 Jun 2022 19:03:27 +0200 Message-Id: <20220607164918.988203056@linuxfoundation.org> X-Mailer: git-send-email 2.36.1 In-Reply-To: <20220607164908.521895282@linuxfoundation.org> References: <20220607164908.521895282@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-3.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Chao Yu commit 958ed92922028ec67f504dcdc72bfdfd0f43936a upstream. This patch tries to fix permission consistency issue as all other mainline filesystems. Since the initial introduction of (posix) fallocate back at the turn of the century, it has been possible to use this syscall to change the user-visible contents of files. This can happen by extending the file size during a preallocation, or through any of the newer modes (punch, zero, collapse, insert range). Because the call can be used to change file contents, we should treat it like we do any other modification to a file -- update the mtime, and drop set[ug]id privileges/capabilities. The VFS function file_modified() does all this for us if pass it a locked inode, so let's make fallocate drop permissions correctly. Cc: stable@kernel.org Signed-off-by: Chao Yu Signed-off-by: Jaegeuk Kim Signed-off-by: Greg Kroah-Hartman --- fs/f2fs/file.c | 4 ++++ 1 file changed, 4 insertions(+) --- a/fs/f2fs/file.c +++ b/fs/f2fs/file.c @@ -1744,6 +1744,10 @@ static long f2fs_fallocate(struct file * inode_lock(inode); + ret = file_modified(file); + if (ret) + goto out; + if (mode & FALLOC_FL_PUNCH_HOLE) { if (offset >= inode->i_size) goto out;